Tech Connect

Tech Connect

Join us on Tuesday, May 7, at 10:30 AM CT at Holidays Pub & Grill for Tech Connect, a day of learning and networking.
Read more
Comments off
Collaboration Roadshow

Collaboration Roadshow

Join us for the HBS Collaborate Roadshow on May 16th in Des Moines to learn how Cisco Webex transforms the way organizations collaborate and connect.
Read more
Comments off
Home Plate Tailgate

Home Plate Tailgate

Join us on Wednesday, June 19, at 11:30 AM CT at Charles Schwab Field for the Home Plate Tailgate at the College World Series.
Read more
Comments off
Digital Signage Best Practices

Digital Signage Best Practices

Discover best practices for digital signage to engage audiences, boost sales, and enhance communication. Learn planning, content, and evaluation tips.
Read more
Comments off
What is a vCIO?

What is a vCIO?

Discover how a Virtual Chief Information Officer (vCIO) can streamline your IT operations, enhance efficiency, and drive innovation at reduced costs.
Read more
Comments off
What is a Human Firewall?

What is a Human Firewall?

Discover the role of a human firewall in cybersecurity. Learn how to strengthen your defense by using your most valuable resource: your people.
Read more
Comments off
Who Should Manage the Firewall?

Who Should Manage the Firewall?

Explore the benefits of a managed firewall service. Discover how firewall management can streamline your operations and safeguard against cyber threats.
Read more
Comments off
Law Firm Finds Reliable Digital Forensics Partner

Law Firm Finds Reliable Digital Forensics Partner

Strong digital forensics work can deliver wins in the courtroom—or produce settlements before cases get that far. Weinhardt attorneys count on HBS to produce evidence in cases from small civil litigation to corporate investigations. 
Read more
Comments off
IT Company Assessing Risk to Protect Clients

IT Company Assessing Risk to Protect Clients

A company managing clients’ IT infrastructure can’t afford a breach. That’s why this IT solution provider took recommendations from their colleagues and hired HBS to conduct a risk assessment.
Read more
Comments off
Accounting Firm Leads the Way with Data Security

Accounting Firm Leads the Way with Data Security

Like all CPA firms, MHCS handles highly sensitive personal and business information. When their system administrator began to envision what a cyberattack could do to their company, he called HBS for a risk assessment. 
Read more
Comments off
Penetration Testing on the IoT Front Lines

Penetration Testing on the IoT Front Lines

As the provider of security systems and other building controls, Baker Group needs total confidence that they’re handing customers a secure facility. Baker Group trusts HBS as its partner for risk assessments and penetration tests.
Read more
Comments off
Shaping the Future of Networking with HBS & Arista

Shaping the Future of Networking with HBS & Arista

RECORDING AVAILABLE - HBS has partnered with Arista Networks, a trailblazer in leaf spine architecture. Arista Networks' innovative cloud operating system EOS takes center stage in this transformation, offering real-time network state-based telemetry and monitoring while adhering to open standards.
Read more
Comments off
What’s New: Dynamics GP & Business Central

What’s New: Dynamics GP & Business Central

RECORDING AVAILABLE - This webinar will discuss the recent announcements from Microsoft about Dynamics GP, and the impacts. We will share information about cloud migration promotions being offered by Microsoft.
Read more
Comments off
Improving Security with Microsoft 365

Improving Security with Microsoft 365

RECORDING AVAILABLE - In this webinar, Heartland Business Systems will discuss the rollout of Granular Delegated Admin Privileges, what it means for you, how we access your tenant, and steps you can take to further secure your environment today.
Read more
Comments off
SASE Delivered Your Way

SASE Delivered Your Way

RECORDING AVAILABLE - Secure access service edge combines networking and security functions in the cloud to deliver seamless, secure access to applications, anywhere users work. The SASE model aims to consolidate these functions in a single, integrated cloud service.
Read more
Comments off
Dynamics GP Year-End Webinar

Dynamics GP Year-End Webinar

RECORDING AVAILABLE - Join us for training, best practices, helpful tips, tricks and more for the year end close process. This webinar will provide you with general information to help you through the year end season.
Read more
Comments off
Ask the FBI: Cybersecurity Tips

Ask the FBI: Cybersecurity Tips

An FBI Special Agent shares cybersecurity tips covering what to do when you suspect an attack, plus preventative steps that can prevent most breaches.
Read more
Comments off
Securing Your Supply Chain

Securing Your Supply Chain

Efficient operations increasingly require showing your clients that you handle data securely and ensuring that your suppliers do the same.
Read more
Comments off
Power Apps: Digitally Transform Government Operations

Power Apps: Digitally Transform Government Operations

RECORDING AVAILABLE - Join us for our webinar to learn how Microsoft’s Power Platform is the solution that can enable your digital transformation. We will showcase examples of how you can drive efficiency, automate processes, and visualize data at your organization utilizing hundreds of pre-built connectors.
Read more
Comments off
Is Your School Prepared for a Cyberattack?

Is Your School Prepared for a Cyberattack?

RECORDING AVAILABLE - In this high-level and technical session, learn what a successful cybersecurity program looks like and some of the specific ways your school can prevent, and if necessary, respond to ransomware and phishing attacks.
Read more
Comments off
Liftoff Your Phone System to the Cloud

Liftoff Your Phone System to the Cloud

RECORDING AVAILABLE - With centralized administration, security, and reliability you can trust, we keep the Webex Cloud always on and always up to date so you can focus on your business. Join us to learn more about Webex Cloud Calling and its robust features.
Read more
Comments off
Why You Need a Data Flow Diagram

Why You Need a Data Flow Diagram

Discover the importance of Data Flow Diagrams (DFDs) in enhancing cybersecurity. Learn how DFDs reveal data paths, potential risks, and help secure your system.
Read more
Comments off
Branch Office for the Digital Era: Are You Prepared

Branch Office for the Digital Era: Are You Prepared

RECORDING AVAILABLE - Use SD-WAN to deploy cloud-based applications without compromise. Cisco’s secure SD-WAN solution delivers intent-based networking for the branch – with consistent user policies and strong integrated security.
Read more
Comments off
Are Passwords Obsolete?

Are Passwords Obsolete?

Passwords don’t have many fans. They’re hard to remember and don’t even keep data safe. So what will replace them? Here are a few access tools coming on strong.
Read more
Comments off
Give Voice to Microsoft Teams

Give Voice to Microsoft Teams

RECORDING AVAILABLE - Join us for this webinar where we will outline the many advantages of migrating your phone system to Teams, the options available to you, the pitfalls to be aware of, and why HBS is your voice partner that can enable a quick and seamless migration to Teams Voice.
Read more
Comments off
The IT Audit Process

The IT Audit Process

Take steps to fully understand the phases of your audit to ensure that you have the appropriate resources and input available at each stage.
Read more
Comments off
COVID Relief Funding for Education & Government

COVID Relief Funding for Education & Government

RECORDING AVAILABLE - Join Fortinet and Heartland Business Systems for a detailed discussion on making the most of your available CARES Act I and CARES Act II (CRRSA Act) funding. Secure remote or online learning, telework, and prepare your network for the influx of devices when people return to facilities.
Read more
Comments off
Virtual Food+Tech Connect

Virtual Food+Tech Connect

RECORDING AVAILABLE - Join us to learn about the technology solutions HBS offers that can help your organization reach its goals. Learn about new technologies and best practices from our senior engineers.
Read more
Comments off
The National Impact of CCPA

The National Impact of CCPA

On January 1, 2020, the California Consumer Privacy Act (CCPA) went into effect. Find out how this privacy bill will impact the rest of the country.
Read more
Comments off
A Look Back

A Look Back

The HBS roots date back to 1990, providing packaging labels to the grocery industry through then owner created Alferi Communications.
Read more
Comments off
IT Control Gap Analysis

IT Control Gap Analysis

Discover the pillars of resilience to keep your business robust amid challenges. Embrace continuity with expert strategies.
Read more
Comments off
SIEM Terms and Definitions

SIEM Terms and Definitions

SIEM is a powerful tool that provides a holistic view into an organization’s technology security. View our list of definitions of the most commonly used terms.
Read more
Comments off
How Does SIEM Work?

How Does SIEM Work?

SIEM works first by gathering all the event logs from configured devices. They are sent to a collector that typically runs on a virtual machine inside the host network.
Read more
Comments off
3 Tips for Detecting Malware

3 Tips for Detecting Malware

Detecting malware is becoming more difficult. Discover tips will help you identify malware even if your anti-malware tools fail to detect an infection.
Read more
Comments off
Hackers and ACH Fraud

Hackers and ACH Fraud

Risk of fraudulent transactions has grown significantly. Learn how to prevent hackers from using Automated Clearing House (ACH) fraud to drain your accounts.
Read more
Comments off

Building an IT Control Library

Navigating IT control objectives across ISO 27001, 27002, PCI-DSS, and SOX presents challenges. Learn how to build an effective information security management program.
Read more
Comments off